Skip to main content

RASK: Request Authentication Using Shared Keys for Secured Data Aggregation in Sensor Network

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 575))

Abstract

Accomplishing a robust security features to resists lethal attacks is still an open research area in wireless sensor network. The present paper review existing security techniques to find that there is still a trade-off between cryptographic-based security incorporations and communication performance. Moreover, we have identified that majority of the existing system has not emphasized on first line of defense i.e. security the route discovery process that can act as a firewall for all forms of illegitimate nodes existing in the network. The proposed study introduced RASK i.e. Request Authentication using Shared Key, which is a novel concept developed using simple quadratic formulation of generating keys for encrypting the message during data aggregation. The study outcome has been significantly benchmarked with recent studies and existing cryptographic standards to find RASK outperform existing techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hesselbach, J., Herrmann, C.: Glocalized Solutions for Sustainability in Manufacturing. Springer, Heidelberg (2011)

    Book  Google Scholar 

  2. Athawale, R.P., Rana, J.G.: Wireless sensor network based environmental temperature monitoring system. In: International Conference on Information Engineering, Management, and Security (2015)

    Google Scholar 

  3. Mostafa, M., Azim, A., Jiang, X.: Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications, 279 p. CRC Press, Boca Raton (2015). Computers

    Google Scholar 

  4. Cagn Gungor, V., Hancke, G.P.: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards. CRC Press, Boca Raton (2013)

    Google Scholar 

  5. Kumari, J., Prachi: A comprehensive survey of routing protocols in wireless sensor networks. In: 2nd IEEE-International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 325–330 (2015)

    Google Scholar 

  6. El-Aaasser, M., Ashour, M.: Energy aware classification for wireless sensor networks routing. In: 15th IEEE-International Conference on Advanced Communication Technology (ICACT), PyeongChang, pp. 66–71 (2013)

    Google Scholar 

  7. Chitnis, M., Pagano, P., Lipari, G., Liang, Y.: A survey on bandwidth resource allocation and scheduling in wireless sensor networks. In: IEEE-International Conference on Network-Based Information Systems, Indianapolis, IN, pp. 121–128 (2009)

    Google Scholar 

  8. Chelli, K.: Security issues in wireless sensor networks: attacks and countermeasures. In: Proceedings of the World Congress on Engineering (2015)

    Google Scholar 

  9. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2006)

    MATH  Google Scholar 

  10. Wu, J., Ota, K., Dong, M., Li, C.: A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4, 2169–3536 (2016)

    Google Scholar 

  11. Fayed, N.S., Daydamoni, E.M., Atwan, A.: Efficient combined security system for wireless sensor network. Egypt. Inf. J. 13(3), 185–190 (2012)

    Article  Google Scholar 

  12. Khan, S.U., Pastrone, C., Lavagno, L., Spirito, M.A.: An authentication and Key establishment scheme for the IP-based wireless sensor networks. Procedia Comput. Sci. 10, 1039–1045 (2012)

    Article  Google Scholar 

  13. Cheikhrouhou, O., Koubâa, A., Dini, G., Alzaid, H., Abid, M.: LNT: a logical neighbor tree for secure group management in wireless sensor networks. Procedia Comput. Sci. 31(5), 198–207 (2011)

    Article  Google Scholar 

  14. Guermazi, A., Abid, M.: An efficient key distribution scheme to secure data-centric routing protocols in hierarchical wireless sensor networks. Procedia Comput. Sci. 5, 208–215 (2011)

    Article  Google Scholar 

  15. The Keccak Sponge Function Family. http://keccak.noekeon.org/. Retrieved 8 Feb 2017

  16. Roy, S., Das, A.K.: Secure hierarchical routing protocol (SHRP) for wireless sensor network. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 20–29. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44966-0_3

    Google Scholar 

  17. Tang, D., Li, T., Ren, J., Wu, J.: Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26, 960–973 (2013)

    Article  Google Scholar 

  18. Zheng, L.-Z., Gao, L., Yu, T.-G.: An energy-balanced clustering algorithm for wireless sensor networks based on distance and distribution. In: Qi, E. (ed.) Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation, pp. 229–240. Atlantis Press, Paris (2016). doi:10.2991/978-94-6239-145-1_23

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Metan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Metan, J., Narasimha Murthy, K.N. (2017). RASK: Request Authentication Using Shared Keys for Secured Data Aggregation in Sensor Network. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57141-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57140-9

  • Online ISBN: 978-3-319-57141-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics